Chapter 7-12 VT Exam
A _________ changes your home page and redirects you to other websites. A) zombie B) browser hijacker C) rootkit D) botnet
B
An online environment for programming that allows development, testing, and displaying cutsom applications is called ______. A) client side programing B) platform as a service C) software as a service D) server side programming
B
The ______ protocol resolves the domain name amaozn.com to an IP address. A) SMTP B) DHCP C) DNS D) FTP
B
C++ is an example of a _______ language. A) fourth B) fifth C) third D) second
C
________ hackers hack into systems to steal or vandalize. A) red hat B) black hat C) gray hat D) white hat
B
In a virtual community, you can communicate with other people by using a(n) ________. A) captcha B) profile C) alias D) avatar
D
The science and telecommunication industries would most likely use the _______ database type. A) multidimensional B) relational C) flat D) object oriented
D
When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce. A) B2B B) C2A C) A2C D) B2C
D
________ is the authoring language that defines the structure of a webpage. A) Hypertext B) User-generated content C) TLD D) HTML
D
________ sites let users evaluate hotels, movies, games, books, and other products and services. A) Social bookmarking B) Really Simple Syndication C) Captcha D) Social review
D
When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________. A) crowdresourcing B) crowdsourcing C) crowdsampling D) crowdreferencing
B
________ is the application of information technology to the field of biology. A) biofeedback B) bioconesis C) bioinformatics D) bioengineering
C
The least expensive form of Internet connection is ________. A) DSL B) cable C) FTTH D) dial-up
D
When the Internet backbone was privatized, five large ________ Access Points made up the new backbone. A) Ethernet B) Fiber C) Wireless D) Network
D
A Facebook ________ is used to promote an organization, a product, or a service. A) Page B) Account C) profile D) user
A
Network speeds are measured in _________ per second. A) bits B) hertz C) nanos D) bytes
A
If your computer has a __________, someone else can gain access to it undetected. A) zombie B) logic bomb C) rootkit D) botnet
C
P2P Networks are normally found in A) corporations B) universities C) homes D) libraries
C
When one business provides services for another, it is a type of e-commerce called ________. A) C2B B) C2C C) B2B D) B2C
C
Which of the following is a client side programming technology? A) Perl B) PHP C) Javascript D) JSP
C
________ raises money from multiple small investors rather than a few large ones. A) Crowdresourcing B) Crowdbrowing C) Crowdfunding D) Crowdsourcing
C
Which organization coordinates the Internet naming system? A) FCC B) WWW C) W3C D) ICANN
D
The SDLC follows the development of a system from planning to the final stage, _________. A) maintenance B) implementation C) analysis D) design
A
The _______ was created in an effort to make it easier for victims to report cybercrimes. A) USA PATRIOT act B) Internet Crime Complaint C) Homeland Security Act D) Computer Fraud and Abuse Act
B
________ is an example of asynchronous communication. A) Skype B) Email C) Chat D) VoIP
B
________ is the process of converting an algorithm into a language the computer can understand. A) debugging B) flowcharting C) coding D) writing
C
To secure your wireless network at home, you should __________. A) back up the computers on the network B) password protect important document files C) set the SSID to closed D) use wireless encryption with a difficult passphrase
D
Which of the following is a server side progrmaming technology? A) JavaScript B) ActiveX controls C) Java applets D) ASP
D
.com is an example of a(n) ________. A) DNS B) TLD C) LTE D) NAP
B
A data ______ defines the fields in a database and the type of data that each field contains. A) mine B) dictionary C) warehouse D) reference
B
A data ______ rule would prevent a user from entering text in a date/time field. A) manipulation B) validation C) monitoring D) redundancy
B
The s in https stands for ________. A) sponsored B) secure C) system D) service
B
Which is not a SQL relational keyword? A) WHERE B) QUIT C) FROM D) SELECT
B
________ technologies use telephone lines to carry digital signals. A) FTTH B) DSL C) FiOS D) WiMAX
B
When using Windows, to make changes, install hardware, or configure settings, you need to use the _____ account on your computer. A) client B) guest C) administrator D) master
C
________ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results. A) RSS B) SMM C) SEO D) IM
C
What is the Internet backbone? A) A company's main connection to the Internet B) The system of satellites that carry the Internet's signals C) The four original nodes of the Internet D) High speed connection between networks
D
Which is NOT a CODIS index? A) Arrestee B) Forensic C) Missing Persons D) Victims
D
Which is NOT an advantage of data normalization? A) makes it easier to update records B) increases query speed C) reduces the database size D) increases database development time
D
Which is a type of data that can be stored in an object oriented database? A) documents and spreadsheets B) documents C) spreadsheets D) images, audio, and video
D
When you enter your credit card information in a website, you know the website is encrypted when you see ____ in the address bar. A) https B) http C) shttp D) ssl
A
________ is one of the most popular C2C websites. A) eBay B) Amazon C) Google Checkout D) PayPal
A
What was the ARPANET? A) A project of the Department of Transportation B) The origins of the Internet C) A network of two computers D) A network originally authorized by President Truman
B
Which broadband service are you likely to use if you live in a very remote area? A) Cable B) Satellite C) DSL D) Fiber
B
Which of the following statements about P2P networks is FALSE? A) They can only support a small number of devices B) The services and security are centralized C) All computers are considered equals D) They can share a printer
B
________ recommends music to you based on your listening preferences. A) Picasa B) Pandora C) Flickr D) SnapDragon
B
Which generation of programming languages is closer to natural language but still requires some programming knowledge? A) fourth generation B) third generation C) fifth generation D) second generation
A
Which of the following is a method of synchronous online communication? A) Instant Messaging B) Email C) Forum D) Newsgroup
A
An email claiming that you have won a lottery might be an example of ___________. A) cyberbullying B) computer fraud C) cyber stalking D) cyber harassment
B
An excel spreadsheet is an example of a(n) database. A) object oriented B) flat C) relational D) hierarchical
B
If you want to connect your home network to the Internet, you will need a ______ in addition to a modem. A) repeater B) router C) terminator D) switch
B
In a database, a _______ stores data in rows and columns. A) field B) table C) cell D) matrix
B
In a one to one relationship, both tables use the same ________ to link two records. A) query B) primary key C) foreign key D) form
B
In excel, you can use ______ to automate tracks. A) C++ B) macros C) Java D) HTML
B
The FTP protocol is used to ________. A) log in to a secure webpage B) transfer files C) surf the web D) verify an email address
B
The _______ database is the most popular type used by businesses. A) hierarchical B) relational C) multidimensional D) flat
B
The ________ a set of five steps that a programmer follows to create a computer program. A) software design lifecycle B) program development cycle C) program design lifecycle D) computer programming ycle
B
________ is the largest online image-sharing site in the world. A) Flickr B) MySpace C) Skype D) LinkedIn
A
A ________ contains the information for a single entity in the database. A) table B) record C) field D) cell
B
Which would be the strongest password? A) customer B) p22w0r6 C) p@55W0?d D) p@ssw*rd
C
Simulating human thinking by emulating the biological connections of the brain is called _______. A) a neural network B) biofeedback C) fuzzy logic D) an expert system
A
The # symbol used by Twitter is called a(n) ________. A) hashtag B) avatar C) forum D) digital footprint
A
The desired output from the ________ phase of the SDLC is a list of requirements for a new system. A) analysis B) maintenance C) planning D) design
A
The nodes on the original Internet system were ________. A) educational institutions B) military bases C) large corporations D) marketing companies
A
The difference between a virus and a worm is a _________. A) worm is a threat to your computer but a virus is not B) virus needs a host file but a worm does not C) virus replicates itself but a worm cannot self replicate D) virus is a threat to your computer but a worm is not
B
Tweets are limited to ________ characters each. A) 50 B) 140 C) 230 D) 340
B
A _____ error is an error in programming design that results in an unexpected outcome. A) syntax B) grammatical C) logic D) runtime
C
A ______ is a network composed of a group of clients and servers under the control of one central security database. A) homegroup B) workgroup C) domain D) client
C
A _________ connects two or more computers in a network. A) repeater B) hub C) router D) switch
C
During the _________ phase of the SDLC, updates to the system may occur, bugs are fixed, and new features are added. A) implementation B) analysis C) maintenance D) design
C
Fifth generation programming languages are primarily used in _______ applications. A) binary B) SaaS C) artificial intelligence D) webpage
C
For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________. A) WAN B) MAN C) LAN D) PAN
C
Procedural programming involves _________. A) writing executable pseudocode B) defining objects and the actions that can be performed on them C) a step by step list of instructions D) drawing flowcharts to ensure that procedures are followed
C
Which cybercrime is considered to be a form of harassment? A) pharming B) clickjacking C) cyber stalking D) phishing
C
Which of the following is NOT a common LAN topology? A) star B) bus C) hierarchical D) ring
C
Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi. A) Broadband B) Regional C) Municipal D) Corporate
C
________ is an example of a microblogging site that allows a limited number of characters in a post. A) The Blogosphere B) Blogger C) Twitter D) Flickr
C
__________ allows the user to selectively extract data from different viewpoints. A) an office support system (OSS) B) a transaction processing system (TPS) C) online analytical processing (OLAP) D) a decision support system (DSS)
C
A ________ is similar to an online journal, in which you can write about anything you want to share. A) bulletin B) log C) chronicle D) blog
D
A router is a form of security because it ________. A) scans your email for malicious content B) implements user account control C) scans webpages before displaying the content D) acts like a firewall
D
All the information someone can find out about you by searching the web is called your ________. A) avatar B) folksonomy C) tagged information D) digital footprint
D
An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________. A) pharming B) cyber stalking C) cyberbullying D) phishing
D
Antivirus software uses ________ to search for known viruses. A) virus checks B) stop and search checks C) definition date checks D) signature checking
D
Hacking to make a political statement is called _______. A) politicking B) sneaking C) cracking D) hacktivism
D
In a relational vehicle database, a _______ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle. A) simple query B) many to many C) one to one D) many to many
D
In the URL http://www.irs.gov, http is the ________. A) TLD B) subdomain C) domain name D) protocol
D
In the URL http://www.irs.gov, irs is the ________. A) TLD B) protocol C) subdomain D) domain name
D
In what phase of the SDLC does user training take place? A) analysis B) planning C) maintenance D) implementation
D
Knowledge engineers develop _____, which are programmed to make decisions in real life situations. A) fuzzy logic B) clones C) knowledge bases D) expert systems
D
What project was coordinated by the US Department of Energy and the National Institutes of Health? A) ARPANET B) Integrated Automated Fingerprint Identification System C) Combined DNA Index System D) Human Genome Project
D
When a company pays people to hack into its own system, it calls in ________ hackers. A) green hat B) black hat C) gray hat D) white hat
D
When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private. A) To: B) Cc: C) Subject D) Bcc:
D
When you decide to use your neighbor's open wireless network without permission, you are ___________. A) hacking B) trolling C) wardriving D) piggybacking
D
When you define objects and the actions that can be performed on them, you are using _______ programming. A) procedural B) object methodology C) algorithm D) object oriented
D
Wireless access points that are available in public spaces are called ________. A) Hyperlinks B) Network Access Points C) Internet protocols D) Hotspots
D
In what phase of the SDLC does testing occur? A) implementation B) analysis C) maintenance D) design
A
The backbone of the Internet is composed of numerous Internet ________ Points around the world. A) Exchange B) Connection C) Hyperlink D) Relay
A
To ensure that a person does not misspell Wednesday in a field, a(n) _________ list can be used. A) lookup B) find feature C) master D) inference
A
________ allows you to communicate with one person at a time. A) Instant messaging B) Really Simple Syndication (RSS) C) User generated content D) Secure Sockets Layer (SSL)
A
A ____ is a device that connects multiple devices on a LAN. A) bus B) switch C) hub D) network interface card
B
A moderated chat room ensures that ________. A) parental controls are in effect B) all content is screened C) only subscribers participate D) no one under the age of 18 is online
B
A(n) _________ improves over time by learning from its interactions. A) knowledge base B) cognitive computing system C) decision support system D) inference engine
B
An expert system is a computer programmed to ________. A) Use SQL statements to respond to requests B) make decisions in real life situations C) searh the web for experts D) present possible decision outcomes
B
In the _________ phase of the SDLC, the project team is assembled and the feasibility studies are completed. A) analysis B) planning C) maintenance D) implementation
B
Podcasts allow time ________, so you can listen on your own schedule. A) lagging B) shifting C) delay D) warping
B
The Internet was originally created as a communication system for the ________. A) Department of Education B) Department of Defense C) U.S. Congress D) University System
B
When you set up your wireless router, you should change the __________, which is also called the wireless network name. A) WAP B) SSID C) NAT D) WEP
B
Which device on a network performs network address translation? A) Repeater B) Router C) Splitter D) Hub
B
Which would make the best primary key in a table? A) Last name B) Social Security C) First name D) Street address
B
A doctor may use a(n) ______ to help diagnose an illness. A) knowledge base B) neural network C) expert system D) clone
C
Employees who are travelling can connect securely to their office network through the Internet when a _____ has been established. A) PAN B) LAN C) VPN D) WLAN
C
One of the most important reasons for Ethernet standards is it ________ . A) can prevent unauthorized users from accessing the Internet B) allows the gov to keep tabs on what you are doing C) assures equipment from different manufacturers is compatible D) prevents overburdening your computer
C
The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________. A) consistency B) isolation C) atomicity D) durability
C
Which is the correct order of the phases in SDLC? A) requirements, analysis, design, implementation and testing, maintenance B) requirements, planning, design, implementation, testing C) planning, analysis, design, implementation and testing, maintenance D) planning, requirements, design, implementation, testing
C
Which statement about cookies is FALSE? A) They are used by websites to identify you. B) It is a small text file. C) They cannot collect information you do not want to share. D) They can be installed without your knowledge.
C
You can subscribe to ________ feeds to stay up-to-date on podcasts and news feeds. A) NSS B) DNS C) RSS D) PSS
C
________ is a social network that is designed for business connections. A) Facebook B) Twitter C) LinkedIn D) Yahoo!
C
A ______ network is one that has at least one computer that provides centralized management, resources, and security. A) homegroup B) peer to peer C) workgroup D) client-server
D
A(n) ________ is a set of rules tht are used to apply a knowledge base to each situation. A) difference engine B) cognitive computing system C) decision support system D) inference engine
D
An email ________ is a block of text that is automatically put at the end of your messages. A) closing B) salutation C) identifier D) signature
D
Each computer is considered equal in a _______ network. A) client server B) wide area C) virtual private D) peer to peer
D
GIS can be used by local municipalities to _________. A) capture criminals B) budget for waste management facilities C) warn citizens of weather related events D) design emergency routes
D
GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface. A) sets B) information C) datacaches D) layers
D
Moving through a neighborhood trying to locate open wireless access points is called __________. A) surfing B) trolling C) hacking D) wardriving
D
Programs that interpret HTML to display a webpage are called ________. A) interpreters B) translators C) compilers D) web browsers
D
The SDLC, the traditional model for system development, is also called the ________ approach. A) spiral B) whirlpool C) Gantt D) waterfall
D
The cyberbullying of one adult by another adult using a computer is known as ______. A) pharming B) phishing C) cyberbullying D) cyber harassment
D
Another name for the actual attack caused by a virus is a _________. A) worm B) payload C) logic bomb D) hoax
B
A _________ could be used to retrieve all the phone numbers from a student database. A) table B) report C) query D) form
C
A company with offices in Buffalo and Seattle would use dedicated _______ lines to connect the two offices. A) PAN B) WLAN C) WAN D) MAN
C
A database is a collection of _______ that has been organized in a meaningful way. A) spreadsheets B) files C) information D) data
C
________ communication allows you to send a message to someone who is not online at the same time. A) Static B) Dynamic C) Asynchronous D) Synchronous
C
Which is an example of a social news site? A) Facebook B) Yelp C) LinkedIn D) reddit
D
You can use a social ________ site to save and share your favorites online. A) news B) media marketing C) review D) bookmarking
D
You would install a(n) ________ if you wanted to enable new capabilities in your web browser. A) toolbar B) add-on C) plug-in D) taskbar
D
________ is the largest online video-hosting site in the world. A) Flickr B) MySpace C) Skype D) YouTube
D
_________ is similar to the way people think, acknowledging that not everything can be answered as a yes or no question. A) fuzzy logic B) expert systems C) Neural networks D) neural logic
A
(In a database) title, author, publication date, and ISBN are examples of _________. A) records B) fields C) tables D) queries
B
A ______ can be set by an employer to prevent you from accessing eBay. A) switch B) firewall C) router D) wireless access point
B
Adding a browser ________ gives you quick access to the features of the application that installed it. A) add-on B) toolbar C) plug-in D) home page
B
In a WLAN, devices are connected by ______ . A) ultraviolet B) Bluetooth C) WiFi D) RFID
B
The rules for communication between devices are called ________. A) firewalls B) protocols C) packets D) domains
B
You should use a(n) ______ account for everyday computing on a computer running Windows. A) guest B) standard C) visitor D) administrator
B
In an office acceptable use policy (AUP), which of the following might be prohibited? A) checking work email B) purchasing business supplies online C) logging in to eBay D) viewing an associate's electronic calendar
C
The rules that ensure the correct construction of coding commands in a programming language is called the _____. A) grammatical B) logic C) semantic D) syntax
D
Which of the following is not a type of programming error? A) syntax B) runtime C) logic D) grammatical
D
_________ redirects you to a phony website by hijacking a domain name. A) phishing B) clickjacking C) shill bidding D) pharming
D
A ______ is a device that connects two or more networks together. A) router B) hub C) switch D) modem
A
A ______ network is a network in which all computers are considered equal. A) peer to peer B) homegroup C) client server D) workgroup
A
To print data or display it in an easy to read format, a _______ can be used. A) report B) table C) record D) form
A
Which of the following transmission media is NOT used to transmit signals on an Ethernet network? A) topology B) twisted pair C) fiber optic D) WiFi
A
Which statement about email is FALSE? A) Copies of your email may exist on several servers even after the recipient deletes it. B) Your employer may read your email at your work. C) It cannot be accessed by hackers. D) Email can be used for targeted marketing.
A
Wikis are designed for ________, which is allowing people to contribute more than just posting a response. A) collaboration B) expert opinions C) asynchronous communication D) synchronous communication
A
A distorted series of letters and numbers, called a ________, is used to ensure that you are a human and not a computer. A) password B) captcha C) signature D) verification
B
A graphic view of an algorithm is called a _________. A) structure chart B) flowchart C) venn diagram D) Gantt chart
B
Clickjacking results in A) sending spam to your friends' email accounts B) malware posting unwanted links on your Facebook page C) you sending money to get more money in return D) your Facebook account being closed without your knowledge
B
Microsoft Office is an example of a(n) _________. A) geographic information system (GIS) B) office support system (OSS) C) transaction processing system (TPS) D) structured query language (SQL)
B
The _________ is the logical model of a new system. A) specification list B) system specification report C) design diagram D) requirement report
B
Using social media to sell services is called ________. A) Short Message Service (SMS) B) Social media marketing (SMM) C) Secure Sockets Layer (SSL) D) Really Simple Syndication (RSS)
B
Which statement about a logic bomb is FALSE? A) They are often planted by disgruntled IT workers. B) It can spread to other machines. C) It can lay dormant until specific conditions are met. D) It can be triggered on a specific date.
B
WiFi networks used in homes and public hotspots use the __________. A) W3C standards B) IEEE 802.11 standards C) POP protocols D) SMTP protocols
B
_______ conveys the steps of an algorithm using English-like statements that focus on logic, not syntax. A) quasicode B) Pseudocode C) virtual code D) structured code
B
________ technology is used for sending email messages. A) Forward-and-push B) Store-and-forward C) Get-and-put D) Push-and-pull
B
If you misspell a command word in a computer program, you have created a _______ error. A) runtime B) semantic C) logic D) runtime
C
The ______ Act passed by US Congress in 1986 made it a crime to access classified information. A) USA PATRIOT B) Cyber Security Enhancement C) Computer Fraud and Abuse D) Cybersecurity
C
The ________ enables users to enter a friendly name like whitehouse.gov instead of an address like 74.125.224.72. A) IP B) TLD C) DNS D) ISP
C
What happens when you click the padlock icon on a webpage? A) You can turn off the security setting of the website. B) You can turn on the security setting of the website. C) You can get a security report about the website. D) There is no padlock icon on a webpage.
C
___________ makes data entry easier because they can be set up to match the layout of a paper document. A) reports B) records C) forms D) queries
C
_________ is an unlawful attack on computers or networks done to intimidate a government or its people. A) cybercrime B) computer fraud C) cyber stalking D) cyber terrorism
D
________ e-commerce allows anyone to sell or trade items online. A) C2C B) C2B C) B2C D) B2B
A
11) The collection of websites that enable users to create user-generated content, connect, network, and share is called social ________. A) methods B) channels C) connections D) media
D
198.168.0.1 is an example of a(n) ________. A) protocol B) domain name C) DNS D) IP address
D
A third-party program, such as Adobe Flash Player, is considered to be a(n) ________. A) toolbar B) add-on C) tab D) plug-in
D
Machine language is written in ______. A) binary B) C++ C) assembly language D) Java
A
A __________ appears to be a legitimate program, but is actually something malicious. A) Trojan horse B) worm C) rootkit D) botnet
A
Data in a(n) ________ database are stored in data cubes. A) multidimensional B) relational C) hierarchical D) flat
A